We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,389 results
  1. Should we embrace “Big Sister”? Smart speakers as a means to combat intimate partner violence

    It is estimated that one in three women experience intimate partner violence (IPV) across the course of their life. The popular uptake of “smart...

    Robert Sparrow, Mark Andrejevic, Bridget Harris in Ethics and Information Technology
    Article Open access 04 November 2023
  2. Illicit Drug Purchases via Social Media Among American Young People

    Illicit drugs are sold online. Besides cryptomarkets, young people today are also using social media to buy and sell different drugs. The aim of...
    Conference paper 2020
  3. FortiRx: Distributed Ledger Based Verifiable and Trustworthy Electronic Prescription Sharing

    A paper-based prescription signed by the prescriber to authorize dispensing of medication is typically used in traditional healthcare. Such systems...
    Anand Kumar Bapatla, Saraju P. Mohanty, Elias Kougianos in Internet of Things. Advances in Information and Communication Technology
    Conference paper 2024
  4. HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification

    With the growing popularity of the Internet, websites could make significant profit by hosting illegal and harmful content, such as violence, sexual,...
    Yunfan Li, Ling**g Yu, Qingyun Liu in Information Security and Cryptology
    Conference paper 2023
  5. Detecting Illicit Drug Ads in Google+ Using Machine Learning

    Opioid abuse epidemics is a major public health emergency in the US. Social media platforms have facilitated illicit drug trading, with significant...
    Fengpan Zhao, Pavel Skums, ... Yubao Wu in Bioinformatics Research and Applications
    Conference paper 2019
  6. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web

    Criminals take advantage of internet communications to amplify the impact of their actions and to form international criminal networks. At the same...
    Richard Frank, Alexander Mikhaylov in Open Source Intelligence and Cyber Crime
    Chapter 2020
  7. Protecting Privacy in Volunteered Geographic Information Processing

    Social media data is used for analytics, e.g., in science, authorities, or the industry. Privacy is often considered a secondary problem. However,...
    Marc Löchner, Alexander Dunkel, Dirk Burghardt in Volunteered Geographic Information
    Chapter Open access 2024
  8. Incorporating digital games into anti-drug material: non-drug-addicted learners vs. drug-addicted learners

    Drug abuse causes serious problems around the world. Thus, anti-drug material has been increasingly developed and used. However, conventional...

    Tzu-Chi Yang, Meng Chang Chen, Sherry Y. Chen in Universal Access in the Information Society
    Article 13 July 2018
  9. Deep Self-Taught Learning for Detecting Drug Abuse Risk Behavior in Tweets

    Drug abuse continues to accelerate toward becoming the most severe public health problem in the United States. The ability to detect drug abuse risk...
    Han Hu, NhatHai Phan, ... Soon Ae Chun in Computational Data and Social Networks
    Conference paper 2018
  10. Relapse Cases Among Drug Addicts Using Logistic Regression Modeling

    The objective of this study is to use this statistical method to determine the factors which are considered to be significant contributors for...
    Siti Fairus Mokhtar, Fazillah Bosli, ... Fathiyah Ahmad@Ahmad Jali in Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017)
    Conference paper 2019
  11. Forensic investigation of the dark web on the Tor network: pathway toward the surface web

    The Dark Web is notorious for being a huge marketplace that promotes illegal products such as indecent images of children, drug, private data, and...

    Philgeun **, Namjun Kim, ... Doowon Jeong in International Journal of Information Security
    Article 22 August 2023
  12. Blockchain in Pharmaceutical Research and the Pharmaceutical Value Chain

    Pharmaceutical research can yield life-changing agents for treating and curing disease, improving quality of life, extending life, and enhancing...
    Kevin A. Clauson, Rachel D. Crouch, ... Nicole Salata in Blockchain in Life Sciences
    Chapter 2022
  13. Physicians’ Brain Digital Twin: Holistic Clinical & Biomedical Knowledge Graphs for Patient Safety and Value-Based Care to Prevent the Post-pandemic Healthcare Ecosystem Crisis

    The ‘reading to cognition gaps’ and the ‘knowledge to action gaps’ for a physician or a care provider are the root causes of patient harm and the...
    Asoke K. Talukder, Erwin Selg, Roland E. Haas in Knowledge Graphs and Semantic Web
    Conference paper 2022
  14. InsightGAN: Semi-Supervised Feature Learning with Generative Adversarial Network for Drug Abuse Detection

    We present a novel generative adversarial network (GAN) model, called InsightGAN, for drug abuse detection. Our model is inspired by two closely...
    Guangzhen Liu, Jun Hu, ... Zhiwu Lu in Neural Information Processing
    Conference paper 2018
  15. Optimizing healthcare system by amalgamation of text processing and deep learning: a systematic review

    The explosion of clinical textual data has drawn the attention of researchers. Owing to the abundance of clinical data, it is becoming difficult for...

    Somiya Rani, Amita Jain in Multimedia Tools and Applications
    Article 15 May 2023
  16. Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System

    The Medical Cyber-Physical System (MCPS) holds the promise of reducing human errors and optimizing healthcare by integrating medical devices,...
    Zhangtan Li, Liang Cheng, ... Dengguo Feng in Wireless Algorithms, Systems, and Applications
    Conference paper 2021
  17. Chronic Cough: Characterizing and Quantifying Burden in Adults Using a Nationwide Electronic Health Records Database

    Chronic cough is a common condition; until recently, no International Classification of Diseases (ICD) code for chronic cough existed; therefore, the...

    Lindsey E. Scierka, Brooklyn A. Bradley, ... Kim G. Smolderen in Journal of Healthcare Informatics Research
    Article 27 September 2023
  18. An NLP-assisted Bayesian time-series analysis for prevalence of Twitter cyberbullying during the COVID-19 pandemic

    COVID-19 has brought about many changes in social dynamics. Stay-at-home orders and disruptions in school teaching can influence bullying behavior...

    Christopher Perez, Sayar Karmakar in Social Network Analysis and Mining
    Article 15 March 2023
  19. Physical Surveillance

    Physical surveillance plays an important role in counterintelligence and counterespionage efforts. By monitoring and observing an organization’s...
    Chapter 2023
  20. A survey on video content rating: taxonomy, challenges and open issues

    Rating a video based on its content is one of the most important solutions to classify videos for audience age groups. In this regard, Film content...

    Amin Khaksar Pour, Woo Chaw Seng, ... Nor Badrul Anuar in Multimedia Tools and Applications
    Article 31 March 2021
Did you find what you were looking for? Share feedback.